Filters
total: 854
filtered: 689
-
Catalog
Chosen catalog filters
Search results for: DEEP NEURAL NETWORKS, EXPLAINABLE ARTIFICIAL INTELLIGENCE, ADVER-SARIAL ATTACKS
-
Widespread theta synchrony and high-frequency desynchronization underlies enhanced cognition
PublicationThe idea that synchronous neural activity underlies cognition has driven an extensive body of research in human and animal neuroscience. Yet, insufficient data on intracranial electrical connectivity has precluded a direct test of this hypothesis in a whole-brain setting. Through the lens of memory encoding and retrieval processes, we construct whole-brain connectivity maps of fast gamma (30-100 Hz) and slow theta (3-8 Hz) spectral...
-
Grade of service determination methodology in IP networks with SIP protocol
PublicationAlthough Grade of Service is very important in VoIP providers evaluation, We wasn't able to find any paper regarding the topic of measuring GoS variables for IP networks utilizing SIP, which are defined like for PSTN/ISDN/GSM networks (post-selection delay, answering delay, release delay, or probability of end-to-end blocking). Due to the lack of research in this field, it was necessary to start from defining measures and cover...
-
Neural Approximators for Variable-Order Fractional Calculus Operators (VO-FC)
PublicationThe paper presents research on the approximation of variable-order fractional operators by recurrent neural networks. The research focuses on two basic variable-order fractional operators, i.e., integrator and differentiator. The study includes variations of the order of each fractional operator. The recurrent neural network architecture based on GRU (Gated Recurrent Unit) cells functioned as a neural approximation for selected...
-
Buried Object Characterization by Data-Driven Surrogates and Regression-Enabled Hyperbolic Signature Extraction
PublicationThis work addresses artificial-intelligence-based buried object characterization using FDTD-based electromagnetic simulation toolbox of a Ground Penetrating Radar (GPR) to generate B-scan data. In data collection, FDTD-based simulation tool, gprMax is used. The task is to estimate geophysical parameters of a cylindrical shape object of various radii, buried at different positions in the dry soil medium simultaneously and independently...
-
New Two-center Ellipsoidal Basis Function Neural Network for Fault Diagnosis of Analog Electronic Circuits
PublicationIn the paper a new fault diagnosis-oriented neural network and a diagnostic method for localization of parametric faults in Analog Electronic Circuits (AECs) with tolerances is presented. The method belongs to the class of dictionary Simulation Before Test (SBT) methods. It utilizes dictionary fault signatures as a family of identification curves dispersed around nominal positions by component tolerances of the Circuit Under Test...
-
Underground Water Level Prediction in Remote Sensing Images Using Improved Hydro Index Value with Ensemble Classifier
PublicationThe economic sustainability of aquifers across the world relies on accurate and rapid estimates of groundwater storage changes, but this becomes difficult due to the absence of insitu groundwater surveys in most areas. By closing the water balance, hydrologic remote sensing measures offer a possible method for quantifying changes in groundwater storage. However, it is uncertain to what extent remote sensing data can provide an...
-
Maximizing SDN resilience to node‐targeted attacks through joint optimization of the primary and backup controllers placements
PublicationIn Software Defined Networks (SDN) packet data switches are configured by a limited number of SDN controllers, which respond to queries for packet forwarding decisions from the switches. To enable optimal control of switches in real time the placement of controllers at network nodes must guarantee that the controller-to-controller and switch-to-controller communications delays are bounded. Apart from the primary controllers that...
-
Service-based Resilience via Shared Protection in Mission-critical Embedded Networks
PublicationMission-critical networks, which for example can be found in autonomous cars and avionics, are complex systems with a multitude of interconnected embedded nodes and various service demands. Their resilience against failures and attacks is a crucial property and has to be already considered in their design phase. In this paper, we introduce a novel approach for optimal joint service allocation and routing, leveraging virtualized...
-
Optimal Design of Transmitarray Antennas via Low-Cost Surrogate Modelling
PublicationOver the recent years, reflectarrays and transmitarrays have been drawing a considerable attention due to their attractive features, including a possibility of realizing high gain and pencil-like radiation patterns without the employment of complex feeding networks. Among the two, transmitarrays seem to be superior over reflectarrays in terms of achieving high radiation efficiency without the feed blockage. Notwithstanding, the...
-
Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
PublicationDuring and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...
-
Insights in microbiotechnology: 2022.Editorial
PublicationThis Research Topic serves as an invaluable resource for readers interested in staying updated with the latest progress and developments in the field of microbiotechnology. It spotlights the innovative research conducted by up-and-coming experts in the field, specifically emphasizing the transforming abilities of microorganisms that greatly influence the scientific community. The advent of multi-omic technologies has revolutionized microbiotechnology,...
-
Exploring the influence of personal factors on physiological responses to mental imagery in sport
PublicationImagery is a well-known technique in mental training which improves performance efficiency and influences physiological arousal. One of the biomarkers indicating the amount of physiological arousal is skin conductance level (SCL). The aim of our study is to understand how individual differences in personality (e.g. neuroticism), general imagery and situational sport anxiety are linked to arousal measuring with SCL in situational...
-
Prediction of maximum tensile stress in plain-weave composite laminates with interacting holes via stacked machine learning algorithms: A comparative study
PublicationPlain weave composite is a long-lasting type of fabric composite that is stable enough when being handled. Open-hole composites have been widely used in industry, though they have weak structural performance and complex design processes. An extensive number of material/geometry parameters have been utilized for designing these composites, thereby an efficient computational tool is essential for that purpose. Different Machine Learning...
-
Evolving neural network as a decision support system — Controller for a game of “2048” case study
PublicationThe paper proposes an approach to designing the neuro-genetic self-learning decision support system. The system is based on neural networks being adaptively learned by evolutionary mechanism, forming an evolved neural network. Presented learning algorithm enables for a selection of the neural network structure by establishing or removing of connections between the neurons, and then for a finding the beast suited values of the network...
-
Improved jamming resistance using electronically steerable parasitic antenna radiator
PublicationThis paper presents an idea of using an Electronically Steerable Parasitic Antenna Radiator (ESPAR) for jamming suppression in IEEE 802.11b networks. Jamming (intentional interference) attacks are known to be effective and easy to perform, which may impose connectivity problems in applications concerning Internet of Things (IoT). In our paper, theoretical considerations are presented and the results of experiments performed in...
-
Determination of chlorine concentration using single temperature modulated semiconductor gas sensor
PublicationA periodic temperature modulation using sinusoidal heater voltage was applied to a commercial SnO2 semiconductor gas sensor. Resulting resistance response of the sensor was analyzed using a feature extraction method based on Fast Fourier Transformation (FFT). The amplitudes of the higher harmonics of the FFT from the dynamic nonlinear responses of measured gas were further utilized as an input for Artificial Neural...
-
Machine Learning Techniques in Concrete Mix Design
PublicationConcrete mix design is a complex and multistage process in which we try to find the best composition of ingredients to create good performing concrete. In contemporary literature, as well as in state-of-the-art corporate practice, there are some methods of concrete mix design, from which the most popular are methods derived from The Three Equation Method. One of the most important features of concrete is compressive strength, which...
-
Recurrent Neural Network Based Adaptive Variable-Order Fractional PID Controller for Small Modular Reactor Thermal Power Control
PublicationThis paper presents the synthesis of an adaptive PID type controller in which the variable-order fractional operators are used. Due to the implementation difficulties of fractional order operators, both with a fixed and variable order, on digital control platforms caused by the requirement of infinite memory resources, the fractional operators that are part of the discussed controller were approximated by recurrent neural networks...
-
Attention-Based Deep Learning System for Classification of Breast Lesions—Multimodal, Weakly Supervised Approach
PublicationBreast cancer is the most frequent female cancer, with a considerable disease burden and high mortality. Early diagnosis with screening mammography might be facilitated by automated systems supported by deep learning artificial intelligence. We propose a model based on a weakly supervised Clustering-constrained Attention Multiple Instance Learning (CLAM) classifier able to train under data scarcity effectively. We used a private...
-
From Individual to Collective: Intelligence Amplification with Bio-Inspired Decisional DNA and its Extensions
PublicationIn nature, deoxyribonucleic acid (DNA) contains the genetic instructions used in the development and functioning of all known living organisms. The idea behind our vision is to develop an artificial system, an architecture that would support discovering, adding, storing, improving and sharing information and knowledge among agents and organizations through experience. We propose a novel Knowledge Representation (KR) approach in...
-
A compact smart sensor based on a neural classifier for objects modeled by Beaunier's model
PublicationA new solution of a smart microcontroller sensor based on a simple direct sensor-microcontroller interface for technical objects modeled by two-terminal networks and by the Beaunier’s model of anticorrosion coating is proposed. The tested object is stimulated by a square pulse and its time voltage response is sampled four times by the internal ADC of microcontroller. A neural classifier based on measurement data classifies the...
-
Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs
PublicationIn ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations’ QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the...
-
Mitigation of Fake Data Content Poisoning Attacks in NDN via Blockchain
PublicationAbstract—Information-centric networks struggle with content poisoning attacks (CPAs), especially their stronger form called Fake Data CPA, in which an intruder publisher uploads content signed with stolen credentials. Following an existing graphinfection based approach leveraging the constrained time when stolen credentials are useful, we design a blockchain-based mitigation scheme for Named Data Networking architectures. We postulate...
-
Controlling computer by lip gestures employing neural network
PublicationResults of experiments regarding lip gesture recognition with an artificial neural network are discussed. The neural network module forms the core element of a multimodal human-computer interface called LipMouse. This solution allows a user to work on a computer using lip movements and gestures. A user face is detected in a video stream from a standard web camera using a cascade of boosted classifiers working with Haar-like features....
-
Detection of Lexical Stress Errors in Non-Native (L2) English with Data Augmentation and Attention
PublicationThis paper describes two novel complementary techniques that improve the detection of lexical stress errors in non-native (L2) English speech: attention-based feature extraction and data augmentation based on Neural Text-To-Speech (TTS). In a classical approach, audio features are usually extracted from fixed regions of speech such as the syllable nucleus. We propose an attention-based deep learning model that automatically de...
-
Emotion Recognition from Physiological Channels Using Graph Neural Network
PublicationIn recent years, a number of new research papers have emerged on the application of neural networks in affective computing. One of the newest trends observed is the utilization of graph neural networks (GNNs) to recognize emotions. The study presented in the paper follows this trend. Within the work, GraphSleepNet (a GNN for classifying the stages of sleep) was adjusted for emotion recognition and validated for this purpose. The...
-
Solubility Characteristics of Acetaminophen and Phenacetin in Binary Mixtures of Aqueous Organic Solvents: Experimental and Deep Machine Learning Screening of Green Dissolution Media
PublicationThe solubility of active pharmaceutical ingredients is a mandatory physicochemical characteristic in pharmaceutical practice. However, the number of potential solvents and their mixtures prevents direct measurements of all possible combinations for finding environmentally friendly, operational and cost-effective solubilizers. That is why support from theoretical screening seems to be valuable. Here, a collection of acetaminophen...
-
DIAGNOSIS OF MALIGNANT MELANOMA BY NEURAL NETWORK ENSEMBLE-BASED SYSTEM UTILISING HAND-CRAFTED SKIN LESION FEATURES
PublicationMalignant melanomas are the most deadly type of skin cancer but detected early have high chances for successful treatment. In the last twenty years, the interest of automated melanoma recognition detection and classification dynamically increased partially because of public datasets appearing with dermatoscopic images of skin lesions. Automated computer-aided skin cancer detection in dermatoscopic images is a very challenging task...
-
Assessing the attractiveness of human face based on machine learning
PublicationThe attractiveness of the face plays an important role in everyday life, especially in the modern world where social media and the Internet surround us. In this study, an attempt to assess the attractiveness of a face by machine learning is shown. Attractiveness is determined by three deep models whose sum of predictions is the final score. Two annotated datasets available in the literature are employed for training and testing...
-
Data Acquisition in a Manoeuver Auto-negotiation System
PublicationTypical approach to collision avoidance systems with artificial intelligence support is that such systems assume a central communication and management point (such as e.g. VTS station), usually located on shore. This approach is, however, not applicable in case of an open water encounter. Thus, recently a new approach towards collision avoidance has been proposed, assuming that all ships in the encounter, either restricted or open...
-
Neural network agents trained by declarative programming tutors
PublicationThis paper presents an experimental study on the development of a neural network-based agent, trained using data generated using declarative programming. The focus of the study is the application of various agents to solve the classic logic task – The Wumpus World. The paper evaluates the effectiveness of neural-based agents across different map configurations, offering a comparative analysis to underline the strengths and limitations...
-
Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management
PublicationThis article outlines an integrated functional safety and cybersecurity evaluation approach within a framework for business continuity management (BCM) in energy companies, including those using Industry 4.0 business and technical solutions. In such companies, information and communication technology (ICT), and industrial automation and control system (IACS) play important roles. Using advanced technologies in modern manufacturing...
-
Optimizing control by robustly feasible model predictive control and application to drinking water distribution systems
PublicationThe paper considers optimizing Model Predictive Control (MPC) for nonlinear plants with output constraints under uncertainties. Although the MPC technology can handle the constraints in the model by solving constraint model based optimization task, satisfying the plant output constraints under the model uncertainty still remains a challenge. The paper proposes Robustly Feasible MPC (RFMPC), which achieves feasibility of the outputs...
-
Evolutionary Algorithm for Selecting Dynamic Signatures Partitioning Approach
PublicationIn the verification of identity, the aim is to increase effectiveness and reduce involvement of verified users. A good compromise between these issues is ensured by dynamic signature verification. The dynamic signature is represented by signals describing the position of the stylus in time. They can be used to determine the velocity or acceleration signal. Values of these signals can be analyzed, interpreted, selected, and compared....
-
TOWARDS EXPLAINABLE CLASSIFIERS USING THE COUNTERFACTUAL APPROACH - GLOBAL EXPLANATIONS FOR DISCOVERING BIAS IN DATA
PublicationThe paper proposes summarized attribution-based post-hoc explanations for the detection and identification of bias in data. A global explanation is proposed, and a step-by-step framework on how to detect and test bias is introduced. Since removing unwanted bias is often a complicated and tremendous task, it is automatically inserted, instead. Then, the bias is evaluated with the proposed counterfactual approach. The obtained results...
-
Performance analysis of an rfid-based 3d indoor positioning system combining scene analysis and neural network methods
PublicationThe main purpose of this research is to improve localization accuracy of an active Radio Frequency Identification, RFID tag, in 3D indoor space. The paper presents a new RFID based 3D Indoor Positioning System which shows performance improvement. The proposed positioning system combines two methods: the Scene Analysis technique and Artificial Neural Network. The results of both simulation using Log-Distance Path Loss Model and...
-
Potential and Use of the Googlenet Ann for the Purposes of Inland Water Ships Classification
PublicationThis article presents an analysis of the possibilities of using the pre-degraded GoogLeNet artificial neural network to classify inland vessels. Inland water authorities monitor the intensity of the vessels via CCTV. Such classification seems to be an improvement in their statutory tasks. The automatic classification of the inland vessels from video recording is a one of the main objectives of the Automatic Ship Recognition and...
-
Multi-criteria Differential Evolution for Optimization of Virtual Machine Resources in Smart City Cloud
PublicationIn a smart city, artificial intelligence tools support citizens and urban services. From the user point of view, smart applications should bring computing to the edge of the cloud, closer to citizens with short latency. However, from the cloud designer point of view, the trade-off between cost, energy and time criteria requires the Pareto solutions. Therefore, the proposed multi-criteria differential evolution can optimize virtual...
-
Chained machine learning model for predicting load capacity and ductility of steel fiber–reinforced concrete beams
PublicationOne of the main issues associated with steel fiber–reinforced concrete (SFRC) beams is the ability to anticipate their flexural response. With a comprehensive grid search, several stacked models (i.e., chained, parallel) consisting of various machine learning (ML) algorithms and artificial neural networks (ANNs) were developed to predict the flexural response of SFRC beams. The flexural performance of SFRC beams under bending was...
-
Prediction of energy consumption and evaluation of affecting factors in a full-scale WWTP using a machine learning approach
PublicationTreatment of municipal wastewater to meet the stringent effluent quality standards is an energy-intensive process and the main contributor to the costs of wastewater treatment plants (WWTPs). Analysis and prediction of energy consumption (EC) are essential in designing and operating sustainable energy-saving WWTPs. In this study, the effect of wastewater, hydraulic, and climate-based parameters on the daily consumption of EC by...
-
Quantitative Risk Assessment in Construction Disputes Based on Machine Learning Tools
PublicationA high monetary value of the construction projects is one of the reasons of frequent disputes between a general contractor (GC) and a client. A construction site is a unique, one-time, and single-product factory with many parties involved and dependent on each other. The organizational dependencies and their complexity make any fault or mistake propagate and influence the final result (delays, cost overruns). The constant will...
-
Exergy and Energy Analyses of Microwave Dryer for Cantaloupe Slice and Prediction of Thermodynamic Parameters Using ANN and ANFIS Algorithms
PublicationThe study targeted towards drying of cantaloupe slices with various thicknesses in a microwave dryer. The experiments were carried out at three microwave powers of 180, 360, and 540 W and three thicknesses of 2, 4, and 6 mm for cantaloupe drying, and the weight variations were determined. Artificial neural networks (ANN) and adaptive neuro-fuzzy inference systems (ANFIS) were exploited to investigate energy and exergy indices of...
-
Machine learning-based seismic fragility and seismic vulnerability assessment of reinforced concrete structures
PublicationMany studies have been performed to put quantifying uncertainties into the seismic risk assessment of reinforced concrete (RC) buildings. This paper provides a risk-assessment support tool for purpose of retrofitting and potential design strategies of RC buildings. Machine Learning (ML) algorithms were developed in Python software by innovative methods of hyperparameter optimization, such as halving search, grid search, random...
-
MACHINE LEARNING–BASED ANALYSIS OF ENGLISH LATERAL ALLOPHONES
PublicationAutomatic classification methods, such as artificial neural networks (ANNs), the k-nearest neighbor (kNN) and selforganizing maps (SOMs), are applied to allophone analysis based on recorded speech. A list of 650 words was created for that purpose, containing positionally and/or contextually conditioned allophones. For each word, a group of 16 native and non-native speakers were audio-video recorded, from which seven native speakers’...
-
Comparative study on the effectiveness of various types of road traffic intensity detectors
PublicationVehicle detection and speed measurements are crucial tasks in traffic monitoring systems. In this work, we focus on several types of electronic sensors, operating on different physical principles in order to compare their effectiveness in real traffic conditions. Commercial solutions are based on road tubes, microwave sensors, LiDARs, and video cameras. Distributed traffic monitoring systems require a high number of monitoring...
-
Minimizing Distribution and Data Loading Overheads in Parallel Training of DNN Acoustic Models with Frequent Parameter Averaging
PublicationIn the paper we investigate the performance of parallel deep neural network training with parameter averaging for acoustic modeling in Kaldi, a popular automatic speech recognition toolkit. We describe experiments based on training a recurrent neural network with 4 layers of 800 LSTM hidden states on a 100-hour corpora of annotated Polish speech data. We propose a MPI-based modification of the training program which minimizes the...
-
Algorithmic Human Resources Management - Perspectives and Challenges
PublicationTheoretical background: Technology – most notably processes of digitalisation, the use of artificial intelligence, machine learning, big data and prevalence of remote work due to pandemic – changes the way organizations manage human resources. One of the increasing trends is the use of so-called “algorithmic management”. It is notably different than previous e-HRM or HRIS (human resources information systems) applications, as it...
-
Selection of Features for Multimodal Vocalic Segments Classification
PublicationEnglish speech recognition experiments are presented employing both: audio signal and Facial Motion Capture (FMC) recordings. The principal aim of the study was to evaluate the influence of feature vector dimension reduction for the accuracy of vocalic segments classification employing neural networks. Several parameter reduction strategies were adopted, namely: Extremely Randomized Trees, Principal Component Analysis and Recursive...
-
Zarządzanie zaufaniem w bezprzewodowych sieciach czujników - studium przypadku
PublicationW artykule przedstawiono studium przypadku dotyczące zastosowania bezprzewodowej sieci czujników do wspomagania pacjenta z nadwagą w jego środowisku domowym. Przyjęto, że sieć wykorzystuje metodę rozproszonego zarządzania zaufaniem i pokazano, że metoda ta umożliwia wykrycie i izolację czujników realizujących działania sprzeczne z polityką sieci. Ilościowe oszacowanie czasu niezbędnego do wykrycia takich...
-
Vehicle classification based on soft computing algorithms
PublicationExperiments and results regarding vehicle type classification are presented. Three classes of vehicles are recognized: sedans, vans and trucks. The system uses a non-calibrated traffic camera, therefore no direct vehicle dimensions are used. Various vehicle descriptors are tested, including those based on vehicle mask only and those based on vehicle images. The latter ones employ Speeded Up Robust Features (SURF) and gradient images...